- Dec 30, 2012
- 4,809
![png_embedded_data.jpg](/proxy.php?image=http%3A%2F%2Ftrtpost.wpengine.netdna-cdn.com%2Ffiles%2F2014%2F02%2Fpng_embedded_data.jpg&hash=adef12d61a31df2376c7c3edb463fd31)
Researchers have discovered a relatively new way to distribute malware that relies on reading JavaScript code stored in an obfuscated PNG file’s metadata to trigger iFrame injections.
More here:
http://threatpost.com/png-image-metadata-leading-to-iframe-injections/104047